(Busra OZDENIZCI, Kerem OK, Vedat COSKUN, Mehmet N. AYDIN. Department of Information Technologies, ISIK University, Istanbul, Turkey. The Fourth International Conference on Information and Computing Science, 25-27 April 2011)
( Francisco Borrego-Jaraba • Irene Luque Ruiz • Miguel A ´ ngel Go´mez-Nieto. Department of Computing and Numerical Analysis,University of Co′rdoba. Personal and Ubiquitous Computing.15, 7, 731--742, 2011)
(Chen, J. and Hines, K. and Leung, W. and Ovaici, N. University of California, Berkeley. journal={Center for Entrepreneurship \& Technology, Tech. Rep}, year={2011})
(Karpischek, S. and Michahelles, F. and Bereuter, A. and Fleisch, E. Department of Management, Technology and Economics ETH Zurich, Switzerland. Next Generation Mobile Applications, Services and Technologies, 2009. NGMAST'09. Third International Conference on, pages={234--238}, year={2009}, organization={IEEE})
(Tamrakar, S. and Ekberg, J.E. and Asokan, N. Aalto University & Nokia Research Center. Proceedings of the sixth ACM workshop on Scalable trusted computing, page={37--48}, year={2011}, organization={ACM})
(Van Damme, G. and Wouters, K.M. and Karahan, H. and Preneel, B. Dept. Electrical Engineering-ESAT/SCD/IBBT-COSIC Katholieke Universiteit Leuven. Proceedings of the 1st ACM workshop on Networking, systems, and applications for mobile handhelds, pages={25--30}, year={2009}, organization={ACM})
(Andersen, A. and Holmstad, {\O}. and Karlsen, R. and Kreutzer, T. Science and Technology University of Troms. {Proceedings of the Workshop on Posters and Demos Track, pages={23}, year={2011}, organization={ACM})
(Hardy, R. and Rukzio, E. and Holleis, P. and Wagner, M. Computing Department, Lancaster University, UK. Proceedings of the 13th International Conference on Human Computer Interaction with Mobile Devices and Services,pages={475--484},year={2011}, organization={ACM})
(Pellerin, R. and Yan, C. and Cordry, J. and Gressier-Soudan E. Hindawi Publishing Corp.International Journal of Computer Games Technology, volume={2009}, pages={7}, year={2009})
(Strommer, E. and Kaartinen, J. and Parkka, J. and Ylisaukko-oja, A. and Korhonen, I. VTT Technical Research Centre of Finland. Engineering in Medicine and Biology Society, 2006. EMBS'06. 28th Annual International Conference of the IEEE. pages={3246--3249}, year={2006}, organization={IEEE})
(Ondrus, J. and Pigneur, Y. University of Lausanne. journal={Information Systems and E-Business Management}, volume={7}, number={3}, pages={347--361}, year={2009}, publisher={Springer})
(Francis, L. and Hancke, G. and Mayes, K. and Markantonakis, K. Royal Holloway University of London. journal={Radio Frequency Identification: Security and Privacy Issues}, pages={35--49}, year={2010}, publisher={Springer})
(Busra OZDENIZCI, Kerem OK, Vedat COSKUN, Mehmet N. AYDIN. Department of Information Technologies, ISIK University, Istanbul, Turkey. The Fourth International Conference on Information and Computing Science, 25-27 April 2011)
( Francisco Borrego-Jaraba • Irene Luque Ruiz • Miguel A ´ ngel Go´mez-Nieto. Department of Computing and Numerical Analysis,University of Co′rdoba. Personal and Ubiquitous Computing.15, 7, 731--742, 2011)
(Chen, J. and Hines, K. and Leung, W. and Ovaici, N. University of California, Berkeley. journal={Center for Entrepreneurship \& Technology, Tech. Rep}, year={2011})
(Karpischek, S. and Michahelles, F. and Bereuter, A. and Fleisch, E. Department of Management, Technology and Economics ETH Zurich, Switzerland. Next Generation Mobile Applications, Services and Technologies, 2009. NGMAST'09. Third International Conference on, pages={234--238}, year={2009}, organization={IEEE})
(Tamrakar, S. and Ekberg, J.E. and Asokan, N. Aalto University & Nokia Research Center. Proceedings of the sixth ACM workshop on Scalable trusted computing, page={37--48}, year={2011}, organization={ACM})
(Van Damme, G. and Wouters, K.M. and Karahan, H. and Preneel, B. Dept. Electrical Engineering-ESAT/SCD/IBBT-COSIC Katholieke Universiteit Leuven. Proceedings of the 1st ACM workshop on Networking, systems, and applications for mobile handhelds, pages={25--30}, year={2009}, organization={ACM})
(Andersen, A. and Holmstad, {\O}. and Karlsen, R. and Kreutzer, T. Science and Technology University of Troms. {Proceedings of the Workshop on Posters and Demos Track, pages={23}, year={2011}, organization={ACM})
(Hardy, R. and Rukzio, E. and Holleis, P. and Wagner, M. Computing Department, Lancaster University, UK. Proceedings of the 13th International Conference on Human Computer Interaction with Mobile Devices and Services,pages={475--484},year={2011}, organization={ACM})
(Pellerin, R. and Yan, C. and Cordry, J. and Gressier-Soudan E. Hindawi Publishing Corp.International Journal of Computer Games Technology, volume={2009}, pages={7}, year={2009})
(Strommer, E. and Kaartinen, J. and Parkka, J. and Ylisaukko-oja, A. and Korhonen, I. VTT Technical Research Centre of Finland. Engineering in Medicine and Biology Society, 2006. EMBS'06. 28th Annual International Conference of the IEEE. pages={3246--3249}, year={2006}, organization={IEEE})
(Ondrus, J. and Pigneur, Y. University of Lausanne. journal={Information Systems and E-Business Management}, volume={7}, number={3}, pages={347--361}, year={2009}, publisher={Springer})
(Haselsteiner, E. and Breitfu{\ss}, K. Philips Semiconductors. Workshop on RFID Security RFIDSec, volume={6}, year={2006})
(Francis, L. and Hancke, G. and Mayes, K. and Markantonakis, K. Royal Holloway University of London. journal={Radio Frequency Identification: Security and Privacy Issues}, pages={35--49}, year={2010}, publisher={Springer})
(Van Damme, G. and Wouters, K. and Preneel, B. Dept. Electrical Engineering-ESAT/SCD/IBBT-COSIC. Workshop on RFID Security--RFIDSec’09, year={2009}